Вы находитесь на странице: 1из 10

SOLUTION BRIEF

Cybersecurity Framework
Risk Management

The Cybersecurity Framework


in Action: An Intel Use Case
Intel Publishes a Cybersecurity Framework Use Case

Advancing cybersecurity across the global digital infrastructure has long been a priority for
Intel. President Obama issued Executive Order 13636Improving Critical Infrastructure
Cybersecurityin February 2013, and over the ensuing year Intel collaborated with government
and industry to develop the Framework for Improving Critical Infrastructure Cybersecurity (the
Framework). The first version of the Framework was delivered on February12, 2014, and
soon thereafter Intel launched a pilot project to test the Frameworks use at Intel.

The Framework Provides Clear Benefit Next Steps for the Framework at
Intels pilot project assessed cybersecurity risk for our Office Intel and Beyond
and Enterprise infrastructure. We focused on developing a use The Framework embodies a longstanding pillar of Intels
case that would create a common language and encourage the cybersecurity strategy: supporting collaboration between
use of the Framework as a process and risk management tool, government, industry, and non-governmental organization
rather than a set of static compliance requirements. stakeholders to improve cybersecurity in a way that promotes
Our early experience with the Framework has helped us innovation, protects citizens privacy and civil liberties, and
harmonize our risk management technologies and language, preserves the promise of the Internet as a driver of global
improve our visibility into Intels risk landscape, inform risk economic development and social interaction.
tolerance discussions across our company, and enhance our As the Framework continues to evolve and mature, we believe
ability to set security priorities, develop budgets, and deploy it should include key elements such as the cyberthreat
security solutions. The pilot resulted in a set of reusable intelligence lifecycle, which is essential to developing a robust
tools and best practices for utilizing the Framework to assess understanding of cybersecurity attacks. Intels pilot project
infrastructure risk; we plan to use these tools and best has verified that the Framework can provide value to even
practices to expand Intels use of the Framework. We hope the largest organizations and has the potential to transform
other organizations will also embrace the Framework, utilizing cybersecurity on a global scale by accelerating cybersecurity
it for the benefit of their own security systems and sharing best practices across the compute continuum.
their results with industry and government partners.
Solution Brief | The Cybersecurity Framework In Action: An Intel Use Case

Introduction and collaboration with the National


Institute of Standards and Technology
Security has long been an Intel priority.
(NIST) during the implementation phase,
Security along with power-efficient
we have devised and implemented an
performance and connectivity comprise
internal risk and management use case
the three computing pillars around which
for the Framework. We conducted a pilot
Intel concentrates its innovation efforts.
project to develop this use case.
In early 2014, Intel formed the Intel
Security Group, a new business unit to
further the security pillar. This business
By focusing on risk The Pilot in Context
unit combines our subsidiary McAfee with
management instead all other security resources within Intel, We are at the preliminary stages of
forming a single organization focused understanding the Framework. As the
of compliance, the development of the Framework was
on accelerating ubiquitous protection
Cybersecurity Framework against security risks for people, nearing its completion, former NIST
Director Pat Gallagher said we were at
has the potential to businesses, and governments worldwide.
the end of the beginning. Dr. Gallaghers
transform cybersecurity Intel has long shared the sentiment with words hold true today, less than a year
the U.S. and global governments that we
on a global scale. since Framework 1.0 was released.
cannot delay in collectively addressing Nonetheless, as an organization currently
the evolving cybersecurity threats using the Framework, we will continue
that face us all, and Intel and Intel to evolve and use the Framework on an
Security will continue to lead efforts ongoing basis.
to improve cybersecurity across the
compute continuum. One way we have By implementing the Framework, we
demonstrated such leadership is by anticipate that Intel will achieve the
investing billions of dollars over the last following benefits:
decade to develop software, hardware, Harmonization of risk management
services, and integrated solutions methodologies, technologies, and
to advance cybersecurity across the language across the enterprise
global digital infrastructure. We also
Improved visibility into Intels risk
work collaboratively with government,
landscape, helping identify both
industry, and non-governmental
strengths and opportunities to
organization stakeholders to improve
improve
cybersecurity in a way that promotes
innovation, protects citizens privacy Better-informed risk tolerance
and civil liberties, and preserves the discussions
promise of the Internet as a driver of Ability to better set security
global economic development and priorities, develop capital and
social interaction. operational expenditure budgets,
and identify potential security
Our support for the Cybersecurity
solutions and practices
Framework (hereafter referred to
as the Framework), created as part Throughout the development process,
of U.S. Executive Order 13636, is Intel actively supported the emergence
grounded not only in our prioritization of the Framework from its initial public
of security but also on thought and comment phase by participating in the
operational leadership. The Framework Framework development workshops
was developed through a process of and by providing comments to the
coordination and collaboration between draft documents that NIST published.
private industry and public enabling Intel believes that the strength of
organizations. Through frequent dialogue the Framework lies in its accessibility

2
Solution Brief | The Cybersecurity Framework In Action: An Intel Use Case

and flexibility; we are committed to management rather than compliance,


proactively developing a Framework the Framework has the potential to
use case to both demonstrate industry transform cybersecurity on a global
Cybersecurity
leadership and provide key learnings to scale and accelerate cybersecurity
drive the evolution of the Framework. We across the compute continuum.
Framework
believe the Frameworks evolution is and Terminology
will continue to be an industry-led effort Core. A set of cybersecurity activities

as we move forward.
Methodology and references that is common across
critical infrastructure sectors and
Intel uses different risk management organized around particular outcomes.
The Framework Core comprises four
tools in different situations, depending
Utilizing the Cybersecurity on the environment being managed
types of elements: Functions, Catego-
ries, Subcategories, and Informative
Framework at Intel and the type and scope of the risks. References.
From the early days of development, We consider the Framework to be a Functions. One of the main compo-
nents of the Framework, Functions
the Intel team responsible for engaging top-level security management tool provide the highest level of structure
with the Framework planned to that helps assess cybersecurity risk for organizing basic cybersecurity
activities into Categories and Subcate-
conduct a pilot project to test its use across the enterprise. Intels approach gories. The five Functions are Identify,
at Intel. Once the 1.0 version of the was to conduct the pilot using the Protect, Detect, Respond, and Recover.
Framework was released and we knew Framework to create an enterprise- Categories. The subdivision
the final configuration, we looked for of a Function into groups of
level risk heat map that could be used
cybersecurity outcomes, closely tied
a business unit to partner with for the to do the following: to programmatic needs and particular
pilot. Because we were in new territory, activities. Examples of Categories
Set risk tolerance baselines include Asset Management, Access
we sought a mature business unit with Control, and Detection Processes.
a robust cybersecurity program and Identify areas that need more
Subcategories. The subdivision of
with a large range of products and detailed or technical assessments a Category into specific outcomes of
services we could use to test some of technical and management activities.
Identify areas of overinvestment Examples of Subcategories include
the Frameworks limits.Intel IT met and underinvestment External information systems are
all these requirements, making it the cataloged, Data-at-rest is protected,
Assist in risk prioritization and Notifications from detection
obvious choice. systems are investigated.
Intel IT is much more than a service Design Tiers. The Framework Implementation
Tiers (Tiers) provide context on how
organization. As an integral part of For assessment purposes, Intel divides an organization views cybersecurity
the Intel business, it delivers value by its compute infrastructure into five risk and the processes in place to
manage that risk. The Tiers range from
offering solutions to other business critical business functions: Design, Office, Partial (Tier 1) to Adaptive (Tier 4) and
units that drive other products. Intel Manufacturing, Enterprise, and Services describe an increasing degree of rigor
ITs cybersecurity program has a large and sophistication in cybersecurity risk
(DOMES). For the pilot project, we used management practices and the extent
number of cybersecurity experts, all of the Framework to perform an initial to which cybersecurity risk manage-
whom could easily provide independent ment is informed by business needs
high-level risk assessment on only the and integrated into an organizations
assessment and evaluation under the Office and Enterprise environments, overall risk management practices.
Framework with minimal training. Intel rather than attempt to apply the Profiles. A representation of the
IT also uses a mature model of cyber Framework across the entire computing outcomes that a particular system
or organization has selected from
functions within the enterprise (the domain. Because Office and Enterprise the Framework Categories and
DOMES model detailed in the Design are similar environments from a risk Subcategories. Profiles can be used
section) that enabled us to further to identify opportunities for improving
management perspective, the subject cybersecurity posture by comparing
simplify the pilot. matter experts (SMEs) involved in the a current profile (the as is state) with
a target profile (the to be state).
We have recently completed the pilot Framework risk assessment pilot were
project, which clearly demonstrated essentially the same people. Also, the For a more comprehensive glossary
the value of the Framework. We plan Office and Enterprise environments most of terms, refer to the Cybersecurity
Framework document. www.nist.
to apply what we learned during closely match the existing Framework
gov/cyberframework/upload/
the pilot to expanding Intels use of Categories (see the Cybersecurity cybersecurity-framework-021214.pdf
the Framework.Most importantly, Framework Terminology sidebar), while
we verified that by focusing on risk we believe the other business functions,

3
Solution Brief | The Cybersecurity Framework In Action: An Intel Use Case

such as Manufacturing and Design, the organization is unaware of this


may require more customization of the problem. With a definitive, universal
Framework Categories. understanding of what an organizations
governance considers an acceptable
The pilot project involved three main
level of risk, the organization can now
Individual groups of people:
compare current and target scores to
Security SMEs The Core Group, comprising 8 to determine where improvements may
Stakeholders 10 senior security SMEs and mid-
The Core Group and Decision Makers be made.
to-senior-level security capability
or program managers, who set
target scores, validated Categories, Implementing the
developed Subcategories, and PilotProject
performed an initial risk assessment During the implementation of the
and scoring. pilot project, we did not treat the
Individual security SMEs, who scored Framework as a recipe book, but
the risk areas. rather as the framework that it is. As
Pilot Project Particpants
Pilot Project Stakeholders and decision makers, such, we felt empowered to tailor it to

Participants who approved target scores, reviewed meet our business needs. We believe
that organizations implementing
assessment results, and set risk
tolerance levels. the Framework should also consider
tailoring it to fit their individual
The activities of these groups are
business processes and priorities, to
described in more detail in the
maximize the benefits they can gain.
Implementing the PilotProject section.
We customized the Framework in the
following areas:
Goals
We established the following goals Tier definitions. We augmented
for the pilot Framework project, which the generic Tier definitions listed
sought to assess cybersecurity risk for in the Framework to provide more
the Office and Enterprise infrastructure: concrete guidance to our assessors,
as applicable to our particular
Establish organizational alignment
environment.
on risk tolerance objectives.
We started with the traditional
Inform the budget planning and
security triad of People, Processes,
prioritization processes.
and Technology, and mapped the
Communicate an aligned cybersecurity Framework definitions into that
risk picture to senior leadership. structure. We then added a new
Create a set of reusable tools and best element, Ecosystem, which we believe
practices for utilizing the Framework to is equally essential to a modern
assess infrastructure risk. corporate security program. Important
organizational and governance issues,
Early in the planning, we believed the
not included in the core model, are
Framework could transform a discussion
now included in this new element.
about risk tolerance objectives from
implicit to explicit. Today it is not Our modifications remained aligned
unusual for an organization to have a to the Framework Tiers graduated
disconnect between the C-level and maturity scale and intent. Table 1 lists
the technical implementation staff level our customized Tier definitions.
concerning risk tolerance, and often

4
Solution Brief | The Cybersecurity Framework In Action: An Intel Use Case

Table 1. Customized Tier Definitions

FOCUS TIER 1 TIER 2 TIER 3 TIER 4


AREA PARTIAL RISK INFORMED REPEATABLE ADAPTIVE
People Cybersecurity The staff and employees The staff possesses the The staffs knowledge
professionals (staff) and have received cybersecurity- knowledge and skills to and skills are regularly
the general employee related training. perform their appointed reviewed for currency and
population have had The staff has a training roles and responsibilities. applicability and new skills,
little to no cybersecurity- pipeline. Employees should receive and knowledge needs are
related training. regular cybersecurity- identified and addressed.
There is an awareness of
The staff has a limited cybersecurity risk at the related training and Employees receive regular
or nonexistent training organizational level. briefings. cybersecurity-related training
pipeline. The staff has a robust and briefings on relevant and
Employees have a general
Security awareness is training pipeline, including emerging security topics.
awareness of security and
limited. company security resources internal and external The staff has a robust training
Employees have little or and escalation paths. security conferences or pipeline and routinely attend
no awareness of company training opportunities. internal and external security
security resources and Organization and business conferences or training
escalation paths. units have a security opportunities.
champion or dedicated
security staff.
Process A risk management Prioritization of cybersecurity Organizational Cybersecurity risk manage-
process has not been activities is informed by orga- cybersecurity practices are ment is an integral part of the
formalized; risks are nizational risk objectives, the regularly updated based organizational culture.
managed in a reactive, threat environment, or mission on the application of risk The organization actively
ad hoc manner. requirements. management processes adapts to a changing cyberse-
Business decisions and Risk-informed, management- to changes in business curity landscape, evolving and
prioritization are not approved processes and or mission requirements sophisticated threats, predic-
factored into risk and procedures are defined and and a changing threat and tive indicators, and lessons
threat assessments. implemented, and the staff has technology landscape. learned from previous events
Risk and threat information adequate resources to perform Consistent risk manage- in a timely manner.
is not communicated to its cybersecurity duties. ment practices are formally The organization continually
internal stakeholders. Cybersecurity information is approved and expressed as incorporates advanced
shared within the organization policy, and there is an orga- cybersecurity technologies
on an informal basis. nization-wide approach to and practices.
manage cybersecurity risk. There is an organization-
Management has approved the
risk management practices, Risk-informed policies, wide approach to managing
but these practices may not processes, and procedures cybersecurity risk that uses
have been established as orga- are defined, implemented as risk-informed policies,
nizational-wide policy. intended, and reviewed. processes, and procedures.
Technology Tools to help manage Tools are deployed and Metrics are used to The tools deployed in the
cybersecurity risk are not supported to address evaluate the usefulness environment are regularly
deployed, not supported, identified risks. and effectiveness of the reviewed for effectiveness
or insufficient to address The tools in deployment are deployed tools. and coverage against
risks. tuned and maintained when The tools in deployment changes in the threat
Tools may be in place but resources are available. are routinely tuned and environment and internal
are not adequately tuned maintained. ecosystem.
The technology deployed,
or maintained. for the most part, keeps pace The technology deployed The tools and technology
Technology deployed with current threats. keeps pace with current and deployed anticipate
lags current threats. emerging threats. emerging threats.
Tool coverage of the risk area
Tool deployment may is complete when deployed. Tool coverage of the risk
not adequately cover area is complete and
risk areas. updated as changes are
recognized.
Ecosystem The organization does The organization knows its The organization The organization manages
not understand its role role in the larger ecosystem understands its ecosystem risk and actively shares in-
in the larger ecosystem but has not formalized its dependencies and partners formation with partners to
or act accordingly. capabilities to interact and and can act accordingly ensure that accurate, current
The organization does share information externally. when it receives information information improves eco-
not have processes in The organization may from these partners. system cybersecurity before
place to participate in participate in or collaborate events occur.
or collaborate with with external organizations on
external organizations cybersecurity issues on an ad
on cybersecurity issues. hoc basis.

5
Solution Brief | The Cybersecurity Framework In Action: An Intel Use Case

Categories. In the Detect Function, Phase 1 Set Target Scores


we added a fourth Category, Threat The Core Group held a one-day, face-
Intelligence, because it is an important to-face session and a half-day virtual
part of Intels security processes. session during which the following
We expect additional Categories to actions took place:
emerge as we apply the Framework
Agreed on methodology and maturity
to Intels Design, Manufacturing, and
descriptions
Services environments.
Validated Functions and Categories
Subcategories. After much
and defined new Subcategories
consideration, we decided not to use
aligned to Intels capabilities,
most of the Subcategories as defined
Pilot Project Phases by the Framework. While the supplied
programs, and processes

Subcategories are appropriate for Assigned target scores by Function


most environments, we created our and Category
PHASE 4 PHASE 1 own Subcategories to better reflect Assessed current status and scored

7
Communicate Set Target how Intel manages each Category.
Results Scores
Functions and Categories
For example, in Asset Management
As a result of this initial phase we were
we created the Subcategories of
months Information, Client, Server, Network,
able to validate that our approach
aligned with Intels existing risk
PHASE 3 PHASE 2 People, and Virtual, which align with
Assess
management methodologies and could
Analyze Results the scheme Intel IT Security uses to
Current Status be a meaningful tool for prioritization
manage assets. In addition, we found
and risk tolerance decisions. Our chief
Subcategories were necessary to our
information security officer (CISO) and
assessment pilot only if that level of
other key stakeholders also validated
granularity helped inform a business
our target scores, further raising our
decision. For example, if the Asset
confidence that we had set them
Management Category received a
accurately.
lowscore, the Subcategories could
help identify the specific aspects Phase 2 Assess Current Status
needing improvement.
We identified senior SME scorers to
conduct an independent risk assessment
Project Phases based on the Framework. Using learnings
Our pilot project consisted of four from our Core Group sessions, we
phases: set target scores, assess our developed individual scoring tools and
current status, analyze the results of provided training through virtual one-
that assessment, and communicate hour sessions (see Training Topics for
those results to managers and senior more information). Once trained, the
leadership. An organized, phased SMEs individually scored the Categories
approach enabled us to successfully and noted specific Subcategories where
implement the Framework in our Office opportunities to improve existed.
and Enterprise environments.
By design, participants were not aware
We completed the project in about of the target scores that the Core Group
seven months. set. The total time that each SME used
for the assessment was 2 to 3 hours,
which included training, using the

6
Solution Brief | The Cybersecurity Framework In Action: An Intel Use Case

self-scoring tool, and participating in a Using a heat map format to identify of the assessed scores. This process
validation of the aggregated scores. score differences greater than one, fostered a dialogue and helped us agree
we examined areas of concern at the on risk tolerance and prioritization.
Phase 3 Analyze Results Subcategory level to further identify
We also informed the capability and
We analyzed the individual SME scores specific areas for improvement.
process owners who were impacted by
and compared them to the Core Group
the results of our discussion. Conveying
scores and the target scores (see Phase 4 Communicate Results
this information helped us prioritize
Figure1). Significant differences between We reviewed our findings and
the key issues in the budgeting
Core Group and individual SME scores recommendations with the CISO and
and planning cycles and examine
can identify visibility issues, either by the staff. A key component of this phase was
where additional, more granular risk
individual SME or the Core Group. to revalidate target scores with the CISO
assessments should be prioritized.
and key stakeholders, in the context

Individual Score (14) Comparing Scores


Heat Map Significant differences can
Evaluating by functional highlight visibility issues
area provides greater insight and focus areas

SME INDIVIDUAL FUNCTIONAL AREA SCORES SCORES RESULTS


ENDPOINT/ COMBINED TIER
DATA SME CORE SCORE TARGET RISK
IDENTIFY POLICY NETWORK PROTECTION IDENTITY OPs APPs AVERAGE GROUP SME AND CORE SCORE GAP
Business Environment 3 3 3 2 3 2 3 2 2 3 1
Asset Management 3 2 2 2 1 3 2 3 3 3 0
Governance 3 2 3 2 2 2 2 2 2 2 0
Risk Assessment 2 2 2 2 2 3 2 1 2 3 1
Risk Management Strategy 4 3 2 2 2 2 3 2 2 4 2

PROTECT
Access Control 2 3 3 2 3 2 3 2 2 3 1
Awareness/Training 2 3 3 2 3 3 3 3 3 4 1
Data Security 2 2 Mapping
2 highlighted
2 outliers3 2 2 3 3 3 0
Protective Process/Procedures 2 3 and3 major differences
1 2 2 2 2 2 4 2
Maintenance 3 2 2 2 2 4 2 1 2 3 1
Protective Technologies 2 2 1 3 1 2 2 3 2 3 1 Focus areas
stand out
DETECT (large )
Anomalies/Events 2 3 1 2 2 4 2 2 2 4 2
Security Continuous Monitoring 2 2 1 2 1 1 1 2 2 4 2
Detection Process 2 3 2 2 3 2 2 4 3 3 0
Threat Intelligence 3 3 3 2 2 2 3 3 3 3 0

RESPOND
Response Planning 2 2 3 2 3 2 3 2 2 4 2
Communication 2 2 3 2 2 3 3 1 2 3 1
Analysis 2 3 3 2 3 3 3 2 2 3 1
Mitigations 2 3 1 2 3 1 2 3 3 3 0
Improvements 3 3 3 3 2 2 2 1 2 2 0
Significant differences
RECOVER between Core and Individual
Recovery Planning 2 3 3 2 scores
2 can highlight
3 3 3 3 3 0
Improvements 1 3 2 1 visibility
2 issues
3 2 1 2 2 0
Communications 2 2 3 2 1 3 2 3 3 3 0

FOR ILLUSTRATIVE PURPOSES ONLY

Figure 1. A heat map resulting from charting individual and group scores and their comparisons. Note: The scores given
are examples and not the actual scores.

7
Solution Brief | The Cybersecurity Framework In Action: An Intel Use Case

Training Topics One of the most important outcomes


We provided training to the SMEs who of our pilot was proving the value of
establishing an organization-specific
Repeatable would be performing the individual
scoring. We also trained facilitators Profile through internal dialogue
Process Flow who will be able to conduct future risk based on the threats, vulnerabilities,
assessment sessions with Core Group and impacts the organization faces.
members and SMEs to set the target Because these security aspects are best
score and perform the Tier target scoring. understood by an organization going
ON
IZATI TA through this process itself, we believe
T SME training. Topics included a brief that creating a tailored Tiers Profile will
RG
RI

history of the Framework and why Intel


PRIO

provide the most value for organizations.


ET

is implementing it, an explanation of


PROCESS how the assessment fits within Intels We also gained the following benefits:

FLOW
RIS K T C U S

decision making process, and a use The Framework pilot project was
case example. These one-hour training effective in improving alignment
DIS

RE E D

sessions were delivered virtually and


OL

to a common risk management


R
ES
S

SI A N C
E

included a question-and-answer
A S S CO
ON E methodology and language across
S period at the end. internal stakeholder communities.
Facilitator training. Topics included When we started to define our own
guidance on the customized Tier Subcategories, we again found value
maturity descriptions, the difference in the dialogue, which resulted in
between the target and assessed improved cross-team alignment on
scores, and how the prioritization/risk the processes and capabilities that
tolerance discussion is handled. We comprised a Category. In addition,
stressed the importance of adhering the Subcategories specific to Intel
to the process flow and repeating the enabled SMEs and stakeholders to
process year over year. better understand the Categories.
Finally, by aligning the Subcategories
to our capabilities, we can more
Results and Benefits
easily see where more detailed
One of the most important and valuable assessment is needed.
benefits of the Framework pilot project
Mapping assessments of common Core
was the internal discussions it helped
items by SMEs in a single risk heat map
foster. Conversations about defining the
enabled quick identification of outliers,
organizations Profile to determine the
significant variances, and visibility
various levels of risk the organization is
issues. Highlighting these issues led to
willing to accept are extremely valuable in
additional discussion and assessment,
aligning and prioritizing an organizations
allowing us to further improve visibility
cybersecurity risk management activities.
into our risk landscape.
The target score versus assessed score
discussions were especially instructive, By similarly mapping results from
as they enabled participants to discuss across other elements of our
and compare risks across domains in infrastructure (Manufacturing, Design,
a common language and on common and so on) we anticipate being able
ground. They also helped facilitate to visualize certain organizational
agreement between stakeholders and trends and groupings regarding our
leadership on risk tolerance and other risk landscape. Gaining the benefit
strategic risk management issues, of these new insights would be more
understandings which in turn can guide difficult without a unifying mechanism
the organization in security project like the Framework.
prioritization and funding.
8
Solution Brief | The Cybersecurity Framework In Action: An Intel Use Case

The pilot project resulted in developing Now that we have proved the validity Conclusion
tools that we can reuse as we expand of the Framework and shown that we
While we are at the preliminary stages
the Frameworks use across Intel. can gain value from it, we can scale
of fully understanding the Framework
These tools included the following: the application of the Framework to
and how it can be deployed across
Risk-scoring worksheet our other DOMES functions, such as
Intel, our early experience with the
Heat map Design and Manufacturing.
Framework has proved valuable. Some
Customized Tier definitions (People, Perform continual iteration with of the benefits realized through our
Process, Technology, Ecosystem) the decision makers throughout Framework pilot project in the Office
The training materials for assessors the process. Cyber risk management and Enterprise environments include
and facilitators developed during the is not an end result; it is a continual harmonization of risk management
pilot project can be reused. process. Therefore, an ongoing technologies and language across the
process of iteration and validation enterprise; improved visibility into
We achieved these results with a cost of
results in a ongoing dialogue about Intels risk landscape, helping identify
under 175 FTE (full-time employee) hours.
risk. This process also results in both strengths and opportunities to
This low cost was due to several factors,
a more successful Framework improve; better-informed risk tolerance
including the Frameworks alignment
implementation, because the SMEs discussions; and the ability to better set
to existing industry risk management
and the decision makers give and security priorities, develop capital and
practices and our own established risk
receive feedbackbetter aligning operational expenditure budgets, and
management culture and set of practices
the Framework to the organizations deploy security solutions.
across Intel business units.
business processes and priorities.
We plan to extend our successful
Use group collaboration mixed with Framework pilot project to other areas

<175
individual scoring. We found that the of Intels critical business functions, such
Core Groups initial work, combined as Design, Manufacturing, and Services
with individual SME assessment and over the coming months.1 As we continue
scoring, provided more effective working with the Framework at Intel,
results than if we had used just a
We achieved results with a we hope to gain a better understanding
single approach. For example, the
cost of under 175 full-time of Tiers and plan to further explore the
dialogue that occurred between the use of Categories and Subcategories. As
employee hours. Core Group members was especially various internal risk management and
helpful in setting the target scores. In governance processes start or reach
contrast, the individual SME scoring appropriate milestones, we will also
Key Learnings and input proved valuable because introduce Framework concepts and
it provided a deeper drill down and integrate applicable portions into
The following list summarizes the key
a SME-specific perspective, such as these processes.
learnings attained during our pilot project.
networking or operations.
Start where you are comfortable. It We believe that as the Framework
Tailor the Framework to your business.
made the most sense for us to start matures and evolves it should include
We believe that an organization
with the Office and Enterprise business the cyberthreat intelligence lifecycle.
should define a Tiers Profile that
functions because our IT Security Automated indicator sharing is
best fits that organizations needs.
organization had already begun included in the Framework Roadmap;2
Additionally, adding, changing,
similar efforts that we could leverage however, that is just the mechanism
or deleting Categories and
as far as management commitment by which intelligence can be shared.
Subcategories helps the Framework
and resources. These existing efforts Cyberthreat intelligence is a much
align with an organizations business
meant that the Office and Enterprise broader discipline, essential to a
environment. All of the work that our
risks were fairly well understood, robust cybersecurity risk management
own team did provided invaluable
so we could apply the Framework program and needs attention in the
discussion and insights that we could
quickly. Also, the existing Framework Framework. Organizations must have a
not have found externally, imported
Categories map well to the Office and robust understanding of the following
from other sources.
Enterprise environments.

9
Solution Brief | The Cybersecurity Framework In Action: An Intel Use Case

cyberthreat intelligence aspects seminars, webinars, and summits, and Authors


to best prepare for and respond to publishing blogs. Raising awareness and
Tim Casey
cybersecurity attacks: encouraging best practices is an integral
Senior Strategic Risk Analyst,
and ongoing part of Intels efforts to Intel Security Group
Relevant threat agents and actors
foster improvements in global cyber risk
Threat agents and actors tactics, management; in our initial experience Kevin Fiftal
techniques, and procedures the Framework has proved a useful tool Civilian Director, Intel Americas
Incidents and campaigns in furthering these overall efforts.
Kent Landfield
Incident handling and vulnerability Director, Standards and Technology
management are also essential pieces Policy, Intel Security Group
To read about the
of cybersecurity risk management and
Cybersecurity Framework, John Miller
warrant consideration for inclusion in
future versions of the Framework.
visit: nist.gov/cyberframework Director, Cybersecurity Policy &
Strategy, Intel Global Public Policy
Because we believe other organizations
can also benefit from deploying the For more information about Dennis Morgan
Chief Security Architect,
Framework, Intel and Intel Security Intels technology solutions Intel Information Technology
are participating in extensive outreach for federal government,
regarding the Framework. This outreach visit: intel.com/federal Brian Willis
includes meeting with governmental Manager, Threat Intelligence and
Infrastructure Protection,
officials, attending conferences,
Intel Security Group

Contributors
The authors wish to thank their
colleagues who contributed to the pilot
process, provided technical content,
Follow the conversation: #intelfederal and reviewed this document. The
authors would like to acknowledge
Jack Lawson and Amit Agrawal for their
valuable assistance throughout the
development of this document. Thank
you also to Jason Kimrey of Intel for his
support and leadership of this project.

1
For more information about how Intel is approaching security in its Manufacturing environment, see Factory of the Future, 2014.
www.mcafee.com/us/resources/white-papers/wp-factory-future.pdf
2
For more information, see the NIST Roadmap for Improving Critical Infrastructure Cybersecurity, 2014.
www.nist.gov/cyberframework/upload/roadmap-021214.pdf
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS AND SERVICES. NO LICENSE, EXPRESS OR
IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS
PROVIDED IN INTELS TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL
DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS AND SERVICES INCLUDING
LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT,
COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
Intel, the Intel logo, Look Inside., and the Look Inside. logo are trademarks of Intel Corporation in the U.S. and/or other countries.
*Other names and brands may be claimed as the property of others.
Copyright 2015 Intel Corporation. All rights reserved. Printed in USA Please Recycle 0115/KFIF/KC/PDF

Вам также может понравиться